US20100082974A1 - Parallel document processing - Google Patents
Parallel document processing Download PDFInfo
- Publication number
- US20100082974A1 US20100082974A1 US12/238,767 US23876708A US2010082974A1 US 20100082974 A1 US20100082974 A1 US 20100082974A1 US 23876708 A US23876708 A US 23876708A US 2010082974 A1 US2010082974 A1 US 2010082974A1
- Authority
- US
- United States
- Prior art keywords
- identity
- verification code
- digital document
- document package
- master
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000012795 verification Methods 0.000 claims abstract description 104
- 238000000034 method Methods 0.000 claims description 60
- 238000013459 approach Methods 0.000 description 4
- 230000004931 aggregating effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- a common way to distribute a document to various sources is by means of an electronic form of the document.
- Several methods exist for an original source to distribute such a digital document to other users such as by email with the digital document as an attachment, by providing a link from which the user may download the digital document, or by saving the digital document to a network that the user may access.
- the user may sign the digital document and return the digital document to the original source.
- One disclosed embodiment includes a method of processing documents distributed in parallel.
- First, one or more digital document packages are received, where each digital document package includes a content portion and an identity-verification code (IVC) verifying an identity of a source from which the digital document package is received.
- IVC identity-verification code
- Each IVC may be a private-key encryption of a content-verification code hashed from the content portion of each digital document package.
- a master digital document package is created, which includes a master content portion equivalent to the content portion in each unmodified digital document package, and one or more different IVCs, each IVC obtained from a digital document package received from a different source.
- FIG. 1 shows a process flow of an example method of processing documents distributed in parallel.
- FIG. 2 shows a process flow for creating an IVC in accordance with an embodiment of the present disclosure.
- FIG. 3 shows another process flow for creating an IVC in accordance with an embodiment of the present disclosure.
- FIG. 4 shows a process flow of an example method of processing documents distributed in parallel.
- FIG. 5 shows a process flow of an example method for verifying IVCs packaged with documents distributed in parallel.
- FIG. 1 shows a process flow of an example method 10 of processing documents distributed in parallel.
- method 10 includes receiving from a source a digital document package including a content portion and an identity-verification code (IVC).
- IVC identity-verification code
- the IVC verifies the identity of the source from which the digital document package is received and may indicate an affirmative acceptance of the contents of the document package by the source.
- the IVC may be a private-key encryption of a content-verification code hashed from the content portion of the digital document package.
- the content-verification code results from applying a hash function to the digital document package.
- the hash function receives as input the digital document package, or at least a content portion thereof, and outputs a string, namely the content-verification code.
- a content-verification code has a unique correspondence to the digital document package in that equivalent digital document packages will yield the same content-verification code, whereas different digital document packages will yield different content-verification codes.
- it may be straightforward to generate the content-verification code from the digital document package the reverse approach of constructing a digital document package from a content-verification code should be nearly impossible in practice.
- the content-verification code Upon encryption with a private key, the content-verification code becomes an IVC.
- Such an encryption follows a public-key cryptography methodology, where a key used to encrypt a message differs from a key used to decrypt the encrypted message.
- public-key cryptography a user is assigned a pair of cryptographic keys, namely a public key and a private key.
- the private key is kept secret, while the public key may be widely distributed by any suitable means.
- the keys are related mathematically, but the private key may not be practically derived from the public key.
- the IVC may be added to a digital document package according to a predetermined set of processing rules and syntax for creating and adding the IVC to the digital document package. Furthermore, the IVC may be added to a digital document package via an application utilizing such processing rules and syntax. As described in more detail below, the same or different applications may use the same processing rules and syntax for aggregating two or more IVCs into a master document.
- FIG. 2 shows a process flow for creating an IVC in accordance with an embodiment of method 10 .
- Such an approach comprises adding an IVC to a content portion to yield a digital document package.
- FIG. 2 begins with a content portion C O , being hashed to yield a content-verification code H O .
- the content-verification code H O may then be encrypted with a private key K O .
- the IVC S O is packaged with the content portion C O to form a digital document package 26 .
- FIG. 3 shows another process flow for creating an IVC in accordance with an embodiment of method 10 .
- Such an approach comprises adding an IVC that may be a private-key encryption of a digital document package, and therefore such an IVC may be a private-key encryption of both a content-verification code and another IVC.
- FIG. 3 begins with an original digital document package 30 being hashed to yield a content-verification code H n .
- the content-verification code H n may then be encrypted with a private key K n .
- This yields an IVC S n corresponding to the owner of the private key K n .
- the IVC S n may be added to the original digital document package 30 yielding a digital document package 34 .
- method 10 next includes, at 14 , obtaining a public key corresponding to a private key used by the source to encrypt the IVC.
- the public key may be obtained by any suitable method.
- One suitable method includes obtaining the public key via a digital certificate corresponding to the source of the IVC, where the digital certificate provides access to the public key.
- the digital certificate may be issued by a trusted certification authority, where the trusted certification authority guarantees the validity of the digital certificate and guarantees that the public key accessible via the digital certificate corresponds to the source of the digital certificate. Furthermore, the digital certificate includes a certification authority identity-verification code corresponding to the trusted certification authority. Any who obtains the digital certificate may then examine the digital certificate to confirm that it was issued by a trusted certification authority.
- method 10 includes decrypting the IVC using the public key to yield a decrypted IVC.
- method 10 includes comparing the decrypted IVC to a master content-verification code.
- the master content-verification code may be calculated by hashing a master content portion of a master digital document package.
- the master digital document package being a digital document package into which the IVCs may be merged at a later step.
- the master content portion is equivalent to an original content portion of an original digital document package sent to the source.
- the purpose of this step is to determine if the source modified the content portion of the digital document package when adding their IVC. If the source did not change the content portion of the digital document package when adding their IVC, decrypting this IVC at 16 yields a decrypted IVC equivalent to the master content-verification code, in which case method 10 further includes, at 20 , merging the IVC into the master digital document package.
- Merging the IVC into the master digital document package may comprise updating a table of contents of the master digital document package, the table of contents indexing each of the IVCs of the master digital document package.
- method 10 comprises determining if there are any other IVCs that are to be added to the master digital document package. If so, method 10 loops to 12 to start method 10 again. If there are no more IVCs to add to the master digital document package at 22 , then method 10 ends.
- method 10 at 18 instead determines that the decrypted IVC is not equivalent to the master content-verification code, then the IVC may be rejected and not merged into the master digital document package. In this case, method 10 bypasses 20 and continues to 22 described above.
- FIG. 4 shows a process flow of an example method of processing documents distributed in parallel.
- FIG. 4 begins with an original source adding their IVC S Original , to an original content portion C Original , to yield a digital document package 40 .
- the original source then sends the digital document package 40 in parallel to a plurality of users. Each user adds their IVC to digital document package 40 received from the source.
- the digital document package 40 may be sent to the users according to a signing policy.
- a signing policy may indicate restrictions on who may add an IVC to the digital document package, so that the digital document package cannot be forwarded to unintended participants who could then add an unwanted IVC.
- the IVCs may be merged into the master digital document package, yielding a master digital document package 44 .
- each merged IVC may independently verify an identity of the source from which that digital document package is received.
- the IVCs may be merged into the master digital document package without validating the IVCs prior to merging.
- an IVC corresponding to each unmodified digital document package is valid whereas an IVC corresponding to a modified digital document package is invalid.
- the master digital document package 44 includes a master content portion C Master , equivalent to the original content portion C Original , and a plurality of different IVCs, each IVC obtained from a digital document package received in parallel from a different user.
- FIG. 5 shows a process flow of an example method for verifying IVCs packaged with documents distributed in parallel.
- FIG. 5 begins at 50 with receiving a plurality of digital document packages.
- Each digital document package e.g., digital document package 52 , digital document package 54 , and digital document package 56 ) has had an IVC added, where the IVC corresponds to different users.
- the digital document packages are examined to determine if the IVCs (e.g., S 1 , S 2 and S n ) may be added to a master digital document package 60 .
- each IVC may be decrypted with the public key corresponding to that user.
- IVC S n may be decrypted with public key K n corresponding to user n.
- Each decrypted IVC (e.g., h 1 , h 2 and h n ) may then be compared to the content-verification code H Master , hashed from the master content portion C Master .
- a decrypted IVC (e.g., h 1 , h 2 and/or h n ) is determined to be equivalent to the content-verification code H Master , then the decrypted IVC (e.g., h 1 , h 2 and/or h n ) may be accepted and the corresponding IVC (e.g., S 1 , S 2 and/or S n ) may be merged into the master digital document package.
- a decrypted IVC (e.g., h 1 , h 2 and/or h n ) is determined to be different than the content-verification code H Master , then the decrypted IVC (e.g., h 1 , h 2 and/or h n ) may be rejected and the corresponding IVC (e.g., S 1 , S 2 and/or S n ) may be left out of the master digital document package. In this way, it can be ensured that the master document will only include IVCs from individuals that did not change the content of the original document. In other words, all IVCs packaged in the master document are based on the same content.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
- A common way to distribute a document to various sources is by means of an electronic form of the document. Several methods exist for an original source to distribute such a digital document to other users, such as by email with the digital document as an attachment, by providing a link from which the user may download the digital document, or by saving the digital document to a network that the user may access. Upon receiving and reviewing the digital document, the user may sign the digital document and return the digital document to the original source.
- This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure.
- Various embodiments related to parallel document processing are disclosed herein. One disclosed embodiment includes a method of processing documents distributed in parallel. First, one or more digital document packages are received, where each digital document package includes a content portion and an identity-verification code (IVC) verifying an identity of a source from which the digital document package is received. Each IVC may be a private-key encryption of a content-verification code hashed from the content portion of each digital document package. Next, a master digital document package is created, which includes a master content portion equivalent to the content portion in each unmodified digital document package, and one or more different IVCs, each IVC obtained from a digital document package received from a different source.
-
FIG. 1 shows a process flow of an example method of processing documents distributed in parallel. -
FIG. 2 shows a process flow for creating an IVC in accordance with an embodiment of the present disclosure. -
FIG. 3 shows another process flow for creating an IVC in accordance with an embodiment of the present disclosure. -
FIG. 4 shows a process flow of an example method of processing documents distributed in parallel. -
FIG. 5 shows a process flow of an example method for verifying IVCs packaged with documents distributed in parallel. -
FIG. 1 shows a process flow of anexample method 10 of processing documents distributed in parallel. At 12,method 10 includes receiving from a source a digital document package including a content portion and an identity-verification code (IVC). The IVC verifies the identity of the source from which the digital document package is received and may indicate an affirmative acceptance of the contents of the document package by the source. The IVC may be a private-key encryption of a content-verification code hashed from the content portion of the digital document package. - As discussed above, the content-verification code results from applying a hash function to the digital document package. The hash function receives as input the digital document package, or at least a content portion thereof, and outputs a string, namely the content-verification code. Such a content-verification code has a unique correspondence to the digital document package in that equivalent digital document packages will yield the same content-verification code, whereas different digital document packages will yield different content-verification codes. Furthermore, although it may be straightforward to generate the content-verification code from the digital document package, the reverse approach of constructing a digital document package from a content-verification code should be nearly impossible in practice.
- Upon encryption with a private key, the content-verification code becomes an IVC. Such an encryption follows a public-key cryptography methodology, where a key used to encrypt a message differs from a key used to decrypt the encrypted message. In public-key cryptography, a user is assigned a pair of cryptographic keys, namely a public key and a private key. The private key is kept secret, while the public key may be widely distributed by any suitable means. The keys are related mathematically, but the private key may not be practically derived from the public key.
- The IVC may be added to a digital document package according to a predetermined set of processing rules and syntax for creating and adding the IVC to the digital document package. Furthermore, the IVC may be added to a digital document package via an application utilizing such processing rules and syntax. As described in more detail below, the same or different applications may use the same processing rules and syntax for aggregating two or more IVCs into a master document.
-
FIG. 2 shows a process flow for creating an IVC in accordance with an embodiment ofmethod 10. Such an approach comprises adding an IVC to a content portion to yield a digital document package.FIG. 2 begins with a content portion CO, being hashed to yield a content-verification code HO. The content-verification code HO may then be encrypted with a private key KO. This yields an IVC SO, corresponding to the owner of the private key KO. Lastly, the IVC SO is packaged with the content portion CO to form adigital document package 26. -
FIG. 3 shows another process flow for creating an IVC in accordance with an embodiment ofmethod 10. Such an approach comprises adding an IVC that may be a private-key encryption of a digital document package, and therefore such an IVC may be a private-key encryption of both a content-verification code and another IVC.FIG. 3 begins with an originaldigital document package 30 being hashed to yield a content-verification code Hn. The content-verification code Hn may then be encrypted with a private key Kn. This yields an IVC Sn, corresponding to the owner of the private key Kn. Lastly, at 32, the IVC Sn may be added to the originaldigital document package 30 yielding adigital document package 34. - Returning to
FIG. 1 ,method 10 next includes, at 14, obtaining a public key corresponding to a private key used by the source to encrypt the IVC. The public key may be obtained by any suitable method. One suitable method includes obtaining the public key via a digital certificate corresponding to the source of the IVC, where the digital certificate provides access to the public key. - The digital certificate may be issued by a trusted certification authority, where the trusted certification authority guarantees the validity of the digital certificate and guarantees that the public key accessible via the digital certificate corresponds to the source of the digital certificate. Furthermore, the digital certificate includes a certification authority identity-verification code corresponding to the trusted certification authority. Anyone who obtains the digital certificate may then examine the digital certificate to confirm that it was issued by a trusted certification authority.
- At 16,
method 10 includes decrypting the IVC using the public key to yield a decrypted IVC. At 18,method 10 includes comparing the decrypted IVC to a master content-verification code. The master content-verification code may be calculated by hashing a master content portion of a master digital document package. The master digital document package being a digital document package into which the IVCs may be merged at a later step. The master content portion is equivalent to an original content portion of an original digital document package sent to the source. - The purpose of this step is to determine if the source modified the content portion of the digital document package when adding their IVC. If the source did not change the content portion of the digital document package when adding their IVC, decrypting this IVC at 16 yields a decrypted IVC equivalent to the master content-verification code, in which
case method 10 further includes, at 20, merging the IVC into the master digital document package. - Merging the IVC into the master digital document package may comprise updating a table of contents of the master digital document package, the table of contents indexing each of the IVCs of the master digital document package.
- Next, at 22
method 10 comprises determining if there are any other IVCs that are to be added to the master digital document package. If so,method 10 loops to 12 to startmethod 10 again. If there are no more IVCs to add to the master digital document package at 22, thenmethod 10 ends. - If
method 10 at 18 instead determines that the decrypted IVC is not equivalent to the master content-verification code, then the IVC may be rejected and not merged into the master digital document package. In this case,method 10 bypasses 20 and continues to 22 described above. -
FIG. 4 shows a process flow of an example method of processing documents distributed in parallel.FIG. 4 begins with an original source adding their IVC SOriginal, to an original content portion COriginal, to yield adigital document package 40. The original source then sends thedigital document package 40 in parallel to a plurality of users. Each user adds their IVC todigital document package 40 received from the source. - In some embodiments, the
digital document package 40 may be sent to the users according to a signing policy. Such a signing policy may indicate restrictions on who may add an IVC to the digital document package, so that the digital document package cannot be forwarded to unintended participants who could then add an unwanted IVC. - At 42, upon receiving and validating that a content portion received from each user is equivalent to the original content portion COriginal, now re-named the master content portion CMaster, the IVCs may be merged into the master digital document package, yielding a master
digital document package 44. As such, each merged IVC may independently verify an identity of the source from which that digital document package is received. - In other embodiments, upon receiving a content portion from each user, the IVCs may be merged into the master digital document package without validating the IVCs prior to merging. This yields a master digital document package including a master content portion equivalent to the content portion in each unmodified digital document package, and a plurality of different IVCs, each identity-verification code obtained from a digital document package received from a different source. In such embodiments, an IVC corresponding to each unmodified digital document package is valid whereas an IVC corresponding to a modified digital document package is invalid.
- Thus, the master
digital document package 44 includes a master content portion CMaster, equivalent to the original content portion COriginal, and a plurality of different IVCs, each IVC obtained from a digital document package received in parallel from a different user. -
FIG. 5 shows a process flow of an example method for verifying IVCs packaged with documents distributed in parallel.FIG. 5 begins at 50 with receiving a plurality of digital document packages. Each digital document package (e.g.,digital document package 52,digital document package 54, and digital document package 56) has had an IVC added, where the IVC corresponds to different users. Next, at 58, the digital document packages are examined to determine if the IVCs (e.g., S1, S2 and Sn) may be added to a masterdigital document package 60. - Upon receiving the digital document packages at 58, each IVC may be decrypted with the public key corresponding to that user. For example, IVC Sn may be decrypted with public key Kn corresponding to user n. Each decrypted IVC (e.g., h1, h2 and hn) may then be compared to the content-verification code HMaster, hashed from the master content portion CMaster. If a decrypted IVC (e.g., h1, h2 and/or hn) is determined to be equivalent to the content-verification code HMaster, then the decrypted IVC (e.g., h1, h2 and/or hn) may be accepted and the corresponding IVC (e.g., S1, S2 and/or Sn) may be merged into the master digital document package. If a decrypted IVC (e.g., h1, h2 and/or hn) is determined to be different than the content-verification code HMaster, then the decrypted IVC (e.g., h1, h2 and/or hn) may be rejected and the corresponding IVC (e.g., S1, S2 and/or Sn) may be left out of the master digital document package. In this way, it can be ensured that the master document will only include IVCs from individuals that did not change the content of the original document. In other words, all IVCs packaged in the master document are based on the same content.
- It should be understood that the configurations and/or approaches described herein are exemplary in nature, and that these specific embodiments or examples are not to be considered in a limiting sense, because numerous variations are possible. The specific routines or methods described herein may represent one or more of any number of processing strategies. As such, various acts illustrated may be performed in the sequence illustrated, in other sequences, in parallel, or in some cases omitted. Likewise, the order of the above-described processes may be changed.
- The subject matter of the present disclosure includes all novel and nonobvious combinations and subcombinations of the various processes, systems and configurations, and other features, functions, acts, and/or properties disclosed herein, as well as any and all equivalents thereof.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/238,767 US20100082974A1 (en) | 2008-09-26 | 2008-09-26 | Parallel document processing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/238,767 US20100082974A1 (en) | 2008-09-26 | 2008-09-26 | Parallel document processing |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100082974A1 true US20100082974A1 (en) | 2010-04-01 |
Family
ID=42058877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/238,767 Abandoned US20100082974A1 (en) | 2008-09-26 | 2008-09-26 | Parallel document processing |
Country Status (1)
Country | Link |
---|---|
US (1) | US20100082974A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9323514B2 (en) | 2013-05-30 | 2016-04-26 | Microsoft Technology Licensing, Llc | Resource package indexing |
US9596219B2 (en) | 2010-04-19 | 2017-03-14 | Amaani, Llc | Method of transmission of encrypted documents |
US9766870B2 (en) | 2013-05-30 | 2017-09-19 | Microsoft Technology Licensing, Llc | Bundle package generation |
US10015282B2 (en) | 2013-05-30 | 2018-07-03 | Microsoft Technology Licensing, Llc | Context-based selective downloading of application resources |
US11400380B2 (en) * | 2017-07-31 | 2022-08-02 | Sony Interactive Entertainment Inc. | Information processing apparatus and download processing method |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088798A (en) * | 1996-09-27 | 2000-07-11 | Kabushiki Kaisha Toshiba | Digital signature method using an elliptic curve, a digital signature system, and a program storage medium having the digital signature method stored therein |
US20010002485A1 (en) * | 1995-01-17 | 2001-05-31 | Bisbee Stephen F. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US20020152389A1 (en) * | 2001-02-22 | 2002-10-17 | Eiichi Horita | Distributed digital signature generation method and digitally signed digital document generation method and apparatus |
US6912660B1 (en) * | 1998-08-07 | 2005-06-28 | Silanis Technology Inc. | Method for parallel approval of an electronic document |
US20050201561A1 (en) * | 2004-01-23 | 2005-09-15 | Yuichi Komano | Multisignature method, apparatus, program, and system |
US20050204129A1 (en) * | 1995-06-05 | 2005-09-15 | Sudia Frank W. | Multi-step digital signature method and system |
US20050262353A1 (en) * | 2004-05-20 | 2005-11-24 | Docomo Communications Laboratories Usa, Inc. | Digital signatures including identity-based aggregate signatures |
US20050270186A1 (en) * | 2004-06-07 | 2005-12-08 | Tai-Hung Lin | Specified index method for abstract syntax notation one encoding systems |
US20060095388A1 (en) * | 2004-10-29 | 2006-05-04 | Research In Motion Limited | System and method for verifying digital signatures on certificates |
US20060161780A1 (en) * | 2005-01-19 | 2006-07-20 | Berryman Christopher B | Method and apparatus for adding signature information to electronic documents |
US20060259440A1 (en) * | 2005-05-13 | 2006-11-16 | Keycorp | Method and system for electronically signing a document |
US20070061579A1 (en) * | 2005-09-09 | 2007-03-15 | Microsoft Corporation | Digital signing policy |
US20080072334A1 (en) * | 2006-09-18 | 2008-03-20 | Todd Bailey | System and method for electronic collaboration |
US20080086642A1 (en) * | 2006-10-06 | 2008-04-10 | Canon Kabushiki Kaisha | Document verification apparatus and control method thereof |
-
2008
- 2008-09-26 US US12/238,767 patent/US20100082974A1/en not_active Abandoned
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010002485A1 (en) * | 1995-01-17 | 2001-05-31 | Bisbee Stephen F. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
US20050204129A1 (en) * | 1995-06-05 | 2005-09-15 | Sudia Frank W. | Multi-step digital signature method and system |
US6088798A (en) * | 1996-09-27 | 2000-07-11 | Kabushiki Kaisha Toshiba | Digital signature method using an elliptic curve, a digital signature system, and a program storage medium having the digital signature method stored therein |
US6912660B1 (en) * | 1998-08-07 | 2005-06-28 | Silanis Technology Inc. | Method for parallel approval of an electronic document |
US20020152389A1 (en) * | 2001-02-22 | 2002-10-17 | Eiichi Horita | Distributed digital signature generation method and digitally signed digital document generation method and apparatus |
US20050201561A1 (en) * | 2004-01-23 | 2005-09-15 | Yuichi Komano | Multisignature method, apparatus, program, and system |
US20050262353A1 (en) * | 2004-05-20 | 2005-11-24 | Docomo Communications Laboratories Usa, Inc. | Digital signatures including identity-based aggregate signatures |
US20050270186A1 (en) * | 2004-06-07 | 2005-12-08 | Tai-Hung Lin | Specified index method for abstract syntax notation one encoding systems |
US20060095388A1 (en) * | 2004-10-29 | 2006-05-04 | Research In Motion Limited | System and method for verifying digital signatures on certificates |
US20060161780A1 (en) * | 2005-01-19 | 2006-07-20 | Berryman Christopher B | Method and apparatus for adding signature information to electronic documents |
US20060259440A1 (en) * | 2005-05-13 | 2006-11-16 | Keycorp | Method and system for electronically signing a document |
US20070061579A1 (en) * | 2005-09-09 | 2007-03-15 | Microsoft Corporation | Digital signing policy |
US20080072334A1 (en) * | 2006-09-18 | 2008-03-20 | Todd Bailey | System and method for electronic collaboration |
US20080086642A1 (en) * | 2006-10-06 | 2008-04-10 | Canon Kabushiki Kaisha | Document verification apparatus and control method thereof |
Non-Patent Citations (3)
Title |
---|
Borja Sotomayor. "The Globus Toolkit 4 Programmer's Tutorial". Section III, Chapter 9, "Fundamental Security Concepts". University of Chicago, Department of Computer Science. Copyright © 2004, 2005. . * |
Kaliski et al. Request for Comments: 2437, "PKCS #1: RSA Cryptography Specifications Version 2.0". RSA Laboratories. Published: 1998-October. . * |
Moussa, Chafic. "Digital Signature and Multiple Signature: Different Cases for Different Purposes". GSEC Practical Assignment, Version 1.4b, Option 1 - Research on Topics in Information Security. SANS Institute InfoSec Reading Room. Published: 2003-07-07. * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9596219B2 (en) | 2010-04-19 | 2017-03-14 | Amaani, Llc | Method of transmission of encrypted documents |
US9323514B2 (en) | 2013-05-30 | 2016-04-26 | Microsoft Technology Licensing, Llc | Resource package indexing |
US9766870B2 (en) | 2013-05-30 | 2017-09-19 | Microsoft Technology Licensing, Llc | Bundle package generation |
US10015282B2 (en) | 2013-05-30 | 2018-07-03 | Microsoft Technology Licensing, Llc | Context-based selective downloading of application resources |
US11400380B2 (en) * | 2017-07-31 | 2022-08-02 | Sony Interactive Entertainment Inc. | Information processing apparatus and download processing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11652644B1 (en) | Quantum-resistant double signature system | |
US11552792B2 (en) | Systems and methods for generating signatures | |
US7937584B2 (en) | Method and system for key certification | |
US9197411B2 (en) | Protocol and method for client-server mutual authentication using event-based OTP | |
US20190140819A1 (en) | System and method for mekle puzzles symeteric key establishment and generation of lamport merkle signatures | |
GB2487503A (en) | Authentication of digital files and associated identities using biometric information | |
CN112385175B (en) | Device for data encryption and integrity | |
EP4144040A1 (en) | Generating shared private keys | |
CN111211910A (en) | Anti-quantum computation CA (certificate Authority) and certificate issuing system based on secret shared public key pool and issuing and verifying method thereof | |
WO2019110399A1 (en) | Two-party signature device and method | |
Shankar et al. | Improved multisignature scheme for authenticity of digital document in digital forensics using edward‐curve digital signature algorithm | |
US20100082974A1 (en) | Parallel document processing | |
CN110572257B (en) | Identity-based data source identification method and system | |
US20210044435A1 (en) | Method for transmitting data from a motor vehicle and method for another vehicle to receive the data through a radio communication channel | |
Kumar et al. | An efficient implementation of digital signature algorithm with SRNN public key cryptography | |
CN114697038B (en) | A quantum attack-resistant electronic signature method and system | |
Moriarty et al. | Pkcs# 12: Personal information exchange syntax v1. 1 | |
EP4385168A1 (en) | Generating digital signature shares | |
US20250112786A1 (en) | Method and system for generating digital signatures using universal composition | |
Jain | Digital signature algorithm | |
CN115694798B (en) | A certificateless digital signcryption method based on SM9 | |
US20240333478A1 (en) | Quantum-resistant cryptosystem and electronic device included in the same | |
GB2401009A (en) | Identifier-based encryption | |
CN111641493A (en) | Logistics block chain consensus method and device based on cloud computing | |
CN114186286A (en) | Random factor and hybrid encryption based directional signature method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION,WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHETH, SARJANA;SLONE, JUSTIN;DAVIS, JACK;AND OTHERS;REEL/FRAME:021832/0851 Effective date: 20080924 |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034564/0001 Effective date: 20141014 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |